<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic why no incoming traffic at all in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730845#M553529</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. you are expert!!!. Mike. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more problem about vpn configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After vpn user - say vpnuser1 logged in vpn, I do see user's attributes (vpnuser1_ONLY )override group policy( GroupPolicy1), however, vpnuser1 was unable to access anything in inside and one single remote host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yijun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Jun 2011 13:49:07 GMT</pubDate>
    <dc:creator>yijunzhou</dc:creator>
    <dc:date>2011-06-16T13:49:07Z</dc:date>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730843#M553523</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am configuring ASA as firewall+vpn,&amp;nbsp; basically outside of appliance is T1 access(, there are 5 vlans in inside via a iptables, iptables's outside is on the same vlan as insdie of ASA (192.168.5.1 and 192.168.5.2).&amp;nbsp; vpn users are authenticated via&amp;nbsp; 2 factors authentication ( SDI, IP is 192.168.5.5) and get ACLs via local database.&amp;nbsp; vpn pool is 192.168.6.1-192.168.6.15. vpn pool is NATed to external IP since companynmr is opened for specific IP and protocol only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL INSIDE works as expected, all other ACLs not working at all (OUTSIDE, vpnuser1_ONLY, D81only, D53only,etc) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the configuration.&amp;nbsp; Please help me find out the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 194.0.0.0 net194&lt;BR /&gt;name 195.0.0.0 net195&lt;BR /&gt;name 200.0.0.0 net200&lt;BR /&gt;name 201.0.0.0 net201&lt;BR /&gt;name 212.0.0.0 net212&lt;BR /&gt;name 217.0.0.0 net217&lt;BR /&gt;name 41.0.0.0 net41&lt;BR /&gt;name 62.0.0.0 net62&lt;BR /&gt;name 77.0.0.0 net77&lt;BR /&gt;name 78.0.0.0 net78&lt;BR /&gt;name 79.0.0.0 net79&lt;BR /&gt;name 83.0.0.0 net83&lt;BR /&gt;name 84.0.0.0 net84&lt;BR /&gt;name 86.0.0.0 net86&lt;BR /&gt;name 87.0.0.0 net87&lt;BR /&gt;name 88.0.0.0 net88&lt;BR /&gt;name 89.0.0.0 net89&lt;BR /&gt;name 90.0.0.0 net90&lt;BR /&gt;name 91.0.0.0 net91&lt;BR /&gt;name 92.0.0.0 net92&lt;BR /&gt;name 93.0.0.0 net93&lt;BR /&gt;name 94.0.0.0 net94&lt;BR /&gt;name 95.0.0.0 net95&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.5.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address xx.xx.xx.194 255.255.255.192 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa822-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool vpnpool 192.168.6.1-192.168.6.15 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface inside&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any inside&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;asdm image disk0:/asdm-631.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 4 xx.xx.xx.238 netmask 255.255.255.255&lt;BR /&gt;global (outside) 3 xx.xx.xx.215 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 2 xx.xx.xx.241 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 1xx.xx.xx.218 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 5 xx.xx.xx.240 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 User1 255.255.255.255&lt;BR /&gt;nat (inside) 1 User3 255.255.255.255&lt;BR /&gt;nat (inside) 5 proxy240 255.255.255.255&lt;BR /&gt;nat (inside) 2 proxy241 255.255.255.255&lt;BR /&gt;nat (inside) 1 User2 255.255.255.255&lt;BR /&gt;nat (inside) 3 companynet52 255.255.255.0&lt;BR /&gt;nat (inside) 4 vpnpool 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 0:10:00&lt;BR /&gt;timeout conn 0:30:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server SDI protocol sdi&lt;BR /&gt;aaa-server SDI (inside) host 192.168.5.5&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication match INSIDE_AUTH inside SDI&lt;BR /&gt;aaa local authentication attempts max-fail 3&lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 5&lt;BR /&gt;http XP 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;client-update enable&lt;BR /&gt;no vpn-addr-assign aaa&lt;BR /&gt;no vpn-addr-assign dhcp&lt;BR /&gt;vpn-addr-assign local reuse-delay 5&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh XP 255.255.255.255 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 10&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;csd image disk0:/securedesktop-asa-3.2.1.103-k9.pkg&lt;BR /&gt;svc image disk0:/anyconnect-win-2.5.2019-k9.pkg 1&lt;BR /&gt;svc enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-simultaneous-logins 8&lt;BR /&gt;vpn-idle-timeout 10&lt;BR /&gt;vpn-session-timeout 60&lt;BR /&gt;vpn-tunnel-protocol l2tp-ipsec &lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp; svc keep-installer none&lt;BR /&gt;&amp;nbsp; svc rekey time 8&lt;BR /&gt;&amp;nbsp; svc rekey method ssl&lt;BR /&gt;&amp;nbsp; svc ask none default svc&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;vpn-simultaneous-logins 1&lt;BR /&gt;vpn-idle-timeout 9&lt;BR /&gt;vpn-session-timeout 45&lt;BR /&gt;vpn-tunnel-protocol svc &lt;BR /&gt;split-tunnel-policy tunnelall&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp; svc keep-installer none&lt;BR /&gt;&amp;nbsp; svc rekey time 25&lt;BR /&gt;&amp;nbsp; svc rekey method ssl&lt;BR /&gt;&amp;nbsp; svc dpd-interval client 30&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway 30&lt;BR /&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information.&lt;BR /&gt;&amp;nbsp; svc routing-filtering-ignore disable&lt;BR /&gt;username vpnuser1 password xxxxx encrypted&lt;BR /&gt;username vpnuser1 attributes&lt;BR /&gt;vpn-group-policy GroupPolicy1&lt;BR /&gt;vpn-idle-timeout 6&lt;BR /&gt;vpn-session-timeout 20&lt;BR /&gt;vpn-filter value vpnuser1_ONLY&lt;BR /&gt;vpn-tunnel-protocol svc &lt;BR /&gt;group-lock value COMAVPN&lt;BR /&gt;service-type remote-access&lt;BR /&gt;username enable_15 password xxxxxx encrypted privilege 15&lt;BR /&gt;tunnel-group DefaultRAGroup webvpn-attributes&lt;BR /&gt;group-alias companyvpn disable&lt;BR /&gt;tunnel-group COMAVPN type remote-access&lt;BR /&gt;tunnel-group COMAVPN general-attributes&lt;BR /&gt;address-pool (inside) vpnpool&lt;BR /&gt;address-pool vpnpool&lt;BR /&gt;authentication-server-group SDI&lt;BR /&gt;authentication-server-group (inside) SDI&lt;BR /&gt;authorization-server-group LOCAL&lt;BR /&gt;default-group-policy GroupPolicy1&lt;BR /&gt;tunnel-group COMAVPN webvpn-attributes&lt;BR /&gt;group-alias companyremote enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730843#M553523</guid>
      <dc:creator>yijunzhou</dc:creator>
      <dc:date>2019-03-11T20:45:48Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730844#M553526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In version 8.2 and earlier, if the traffic is coming from the outside, you will need to allow traffic to the public IP instead of the private, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look at this: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 209.10.194.239 companyftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list OUTSIDE extended permit tcp any host companyftp object-group ftpservice &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list should go like this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE extended permit tcp any host 209.10.194.239 object-group ftpservice &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For hosts trying to access the server from the outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jun 2011 04:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730844#M553526</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-16T04:41:33Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730845#M553529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. you are expert!!!. Mike. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more problem about vpn configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After vpn user - say vpnuser1 logged in vpn, I do see user's attributes (vpnuser1_ONLY )override group policy( GroupPolicy1), however, vpnuser1 was unable to access anything in inside and one single remote host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yijun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jun 2011 13:49:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730845#M553529</guid>
      <dc:creator>yijunzhou</dc:creator>
      <dc:date>2011-06-16T13:49:07Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730846#M553532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you call vpnuser1_ONLY is just a vpn filter, is not a group policy. That being said only what is here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host dev28 object-group tcp_for_28 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host QuickBooks object-group tcp3389 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 object-group mailslist object-group tcp3389 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host XP object-group tcp3389 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host N92 eq ssh log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host companynmr eq ssh log &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would be the things that the VPN client can connect to, no other traffic would be permitted. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jun 2011 00:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730846#M553532</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-17T00:36:03Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730847#M553534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the confusion.&amp;nbsp; I should this is 2nd issue other than no incoming traffic.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what happen is after vpnuser1 logged in vpn, he cannot access any internal host as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yijun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jun 2011 01:49:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730847#M553534</guid>
      <dc:creator>yijunzhou</dc:creator>
      <dc:date>2011-06-17T01:49:53Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730848#M553539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yujin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont worry, I am glad to help. Not quite a VPN expert, but based on the configuration, I think you can only access what is explicitly allowed on the following access list &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host dev28 object-group tcp_for_28 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host QuickBooks object-group tcp3389 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 object-group mailslist object-group tcp3389 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host XP object-group tcp3389 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host N92 eq ssh log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host companynmr eq ssh log &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are not even able to access what you explicitly permitted on this ACL, please go ahead and start the logs on the ASA firewall, connect a VPN client, try to send traffic and paste the logs over here, I will be more than glad to help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jun 2011 02:12:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730848#M553539</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-17T02:12:08Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730849#M553550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really appreciate your kind help.&amp;nbsp; I am pretty new to Cisco ASA, we use checkpoint before.&amp;nbsp; The following is the log I caught after vpnuser1 logged in from public IP 66.167.16.82:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show conn all &lt;/P&gt;&lt;P&gt;5 in use, 71 most used&lt;/P&gt;&lt;P&gt;UDP outside 66.167.16.82:63523 NP Identity Ifc 209.10.194.194:443, idle 0:00:03, bytes 15847, flags -&lt;/P&gt;&lt;P&gt;TCP outside 66.167.16.82:49247 NP Identity Ifc 209.10.194.194:443, idle 0:00:02, bytes 1487, flags UOB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show vpn-sessiondb &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Active Session Summary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sessions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Active : Cumulative : Peak Concurrent : Inactive&lt;/P&gt;&lt;P&gt;&amp;nbsp; SSL VPN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Clientless only&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; With client&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; Email Proxy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; IPsec LAN-to-LAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; IPsec Remote Access&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; Totals&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;License Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp; IPsec&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25&amp;nbsp;&amp;nbsp;&amp;nbsp; Configured :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25&amp;nbsp;&amp;nbsp;&amp;nbsp; Active :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; Load :&amp;nbsp;&amp;nbsp; 0%&lt;/P&gt;&lt;P&gt;&amp;nbsp; SSL VPN :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp; Configured :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp; Active :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp; Load :&amp;nbsp; 50%&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Active : Cumulative : Peak Concurrent&lt;/P&gt;&lt;P&gt;&amp;nbsp; IPsec&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; SSL VPN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; AnyConnect Mobile :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linksys Phone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; Totals&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tunnels:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Active : Cumulative : Peak Concurrent&lt;/P&gt;&lt;P&gt;&amp;nbsp; Clientless&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P&gt;&amp;nbsp; SSL-Tunnel&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P&gt;&amp;nbsp; DTLS-Tunnel :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P&gt;&amp;nbsp; Totals&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 18&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Active NAC Sessions:&lt;/P&gt;&lt;P&gt;&amp;nbsp; No NAC sessions to display&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Active VLAN Mapping Sessions:&lt;/P&gt;&lt;P&gt;&amp;nbsp; No VLAN Mapping sessions to display&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show vpn-sessiondb svc &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Session Type: SVC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Username&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : vpnuser1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Index&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 4&lt;/P&gt;&lt;P&gt;Assigned IP&amp;nbsp; : 192.168.6.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Public IP&amp;nbsp;&amp;nbsp;&amp;nbsp; : 66.167.16.82&lt;/P&gt;&lt;P&gt;Protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Clientless SSL-Tunnel&lt;/P&gt;&lt;P&gt;License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : SSL VPN&lt;/P&gt;&lt;P&gt;Encryption&amp;nbsp;&amp;nbsp; : RC4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hashing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : SHA1&lt;/P&gt;&lt;P&gt;Bytes Tx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2485998&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes Rx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 80017&lt;/P&gt;&lt;P&gt;Group Policy : GroupPolicy1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tunnel Group : L5MVPN&lt;/P&gt;&lt;P&gt;Login Time&amp;nbsp;&amp;nbsp; : 09:15:13 EDT Fri Jun 17 2011&lt;/P&gt;&lt;P&gt;Duration&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0h:17m:59s&lt;/P&gt;&lt;P&gt;Inactivity&amp;nbsp;&amp;nbsp; : 0h:00m:00s&lt;/P&gt;&lt;P&gt;NAC Result&amp;nbsp;&amp;nbsp; : Unknown&lt;/P&gt;&lt;P&gt;VLAN Mapping : N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following are logs caught:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:27:26&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:27:13&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:27:13&amp;nbsp; 302016&amp;nbsp; 192.168.14.2&amp;nbsp; 62567&amp;nbsp; 209.10.194.194&amp;nbsp; 443&amp;nbsp; Teardown UDP connection 10276 for outside:192.168.4.2/62567 to identity:209.10.194.194/443 duration 0:02:01 bytes 99&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:27:12&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:39&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:39&amp;nbsp; 722022&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group &lt;GROUPPOLICY1&gt; User &lt;VPNUSER1&gt; IP &amp;lt;66.167.16.82&amp;gt; UDP SVC connection established without compression&lt;/VPNUSER1&gt;&lt;/GROUPPOLICY1&gt;&lt;/P&gt;&lt;P&gt;5&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:39&amp;nbsp; 722033&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group &lt;GROUPPOLICY1&gt; User &lt;VPNUSER1&gt; IP &amp;lt;66.167.16.82&amp;gt; First UDP SVC connection established for SVC session.&lt;/VPNUSER1&gt;&lt;/GROUPPOLICY1&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:39&amp;nbsp; 725002&amp;nbsp; 66.167.16.82&amp;nbsp; 63523&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device completed SSL handshake with client outside:66.167.16.82/63523&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:39&amp;nbsp; 725003&amp;nbsp; 66.167.16.82&amp;nbsp; 63523&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL client outside:66.167.16.82/63523 request to resume previous session.&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:38&amp;nbsp; 725001&amp;nbsp; 192.168.14.2&amp;nbsp; 63523&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Starting SSL handshake with client outside:192.168.4.2/63523 for DTLSv1 session.&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:38&amp;nbsp; 302015&amp;nbsp; 192.168.14.2&amp;nbsp; 63523&amp;nbsp; 209.10.194.194&amp;nbsp; 443&amp;nbsp; Built inbound UDP connection 10282 for outside:192.168.4.2/63523 (192.168.4.2/63523) to identity:209.10.194.194/443 (209.10.194.194/443)&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:38&amp;nbsp; 725001&amp;nbsp; 66.167.16.82&amp;nbsp; 63523&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Starting SSL handshake with client outside:66.167.16.82/63523 for DTLSv1 session.&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:38&amp;nbsp; 302015&amp;nbsp; 66.167.16.82&amp;nbsp; 63523&amp;nbsp; 209.10.194.194&amp;nbsp; 443&amp;nbsp; Built inbound UDP connection 10281 for outside:66.167.16.82/63523 (66.167.16.82/63523) to identity:209.10.194.194/443 (209.10.194.194/443)&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:38&amp;nbsp; 722023&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group &lt;GROUPPOLICY1&gt; User &lt;VPNUSER1&gt; IP &amp;lt;66.167.16.82&amp;gt; UDP SVC connection terminated without compression&lt;/VPNUSER1&gt;&lt;/GROUPPOLICY1&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:38&amp;nbsp; 725007&amp;nbsp; 66.167.16.82&amp;nbsp; 62181&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL session with client outside:66.167.16.82/62181 terminated.&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:38&amp;nbsp; 302016&amp;nbsp; 66.167.16.82&amp;nbsp; 62181&amp;nbsp; 209.10.194.194&amp;nbsp; 443&amp;nbsp; Teardown UDP connection 10278 for outside:66.167.16.82/62181 to identity:209.10.194.194/443 duration 0:00:41 bytes 10480&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:35&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:22&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:22&amp;nbsp; 110002&amp;nbsp; 192.168.6.1&amp;nbsp; 62874&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Failed to locate egress interface for UDP from outside:192.168.6.1/62874 to 239.255.255.250/1900&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:21&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:20&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside,,&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 302014&amp;nbsp; 66.167.16.82&amp;nbsp; 49246&amp;nbsp; 209.10.194.194&amp;nbsp; 443&amp;nbsp; Teardown TCP connection 10277 for outside:66.167.16.82/49246 to identity:209.10.194.194/443 duration 0:00:29 bytes 1303 TCP Reset-O,,&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside,,&lt;/P&gt;&lt;P&gt;5&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 722028&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group &lt;GROUPPOLICY1&gt; User &lt;VPNUSER1&gt; IP &amp;lt;66.167.16.82&amp;gt; Stale SVC connection closed.,,&lt;/VPNUSER1&gt;&lt;/GROUPPOLICY1&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 725007&amp;nbsp; 66.167.16.82&amp;nbsp; 49246&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL session with client outside:66.167.16.82/49246 terminated.,,&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 734001&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DAP: User vpnuser1, Addr 66.167.16.82, Connection AnyConnect: The following DAP records were selected for this connection: DfltAccessPolicy&lt;/P&gt;&lt;P&gt;4&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 722051&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group &lt;GROUPPOLICY1&gt; User &lt;VPNUSER1&gt; IP &amp;lt;66.167.16.82&amp;gt; Address &amp;lt;192.168.6.1&amp;gt; assigned to session,,&lt;/VPNUSER1&gt;&lt;/GROUPPOLICY1&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 722022&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group &lt;GROUPPOLICY1&gt; User &lt;VPNUSER1&gt; IP &amp;lt;66.167.16.82&amp;gt; TCP SVC connection established without compression,,&lt;/VPNUSER1&gt;&lt;/GROUPPOLICY1&gt;&lt;/P&gt;&lt;P&gt;5&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 722032&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group &lt;GROUPPOLICY1&gt; User &lt;VPNUSER1&gt; IP &amp;lt;66.167.16.82&amp;gt; New TCP SVC connection replacing old connection.,,&lt;/VPNUSER1&gt;&lt;/GROUPPOLICY1&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 725002&amp;nbsp; 66.167.16.82&amp;nbsp; 49247&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device completed SSL handshake with client outside:66.167.16.82/49247,,&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 725001&amp;nbsp; 66.167.16.82&amp;nbsp; 49247&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Starting SSL handshake with client outside:66.167.16.82/49247 for TLSv1 session.,,&lt;/P&gt;&lt;P&gt;6&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:19&amp;nbsp; 302013&amp;nbsp; 66.167.16.82&amp;nbsp; 49247&amp;nbsp; 209.10.194.194&amp;nbsp; 443&amp;nbsp; Built inbound TCP connection 10280 for outside:66.167.16.82/49247 (66.167.16.82/49247) to identity:209.10.194.194/443 (209.10.194.194/443),,&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:18&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside,,&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:26:10&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yijun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jun 2011 15:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730849#M553550</guid>
      <dc:creator>yijunzhou</dc:creator>
      <dc:date>2011-06-17T15:31:53Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730850#M553558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yijun &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the logs, the only traffic that I can see from the host 192.168.6.1 is NetBios traffic, that is pretty much it, I dont see any tcp connections or you trying to access any internal resources, can you gather the logs when you try a tcp connection to a resource on the inside? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jun 2011 17:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730850#M553558</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-17T17:53:13Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730851#M553564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;Sorry I am pretty new to cisco ASA, I though it was the all logs.&amp;nbsp; Would you please guide me through how to enable detail log and how to grub it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;Yijun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jun 2011 18:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730851#M553564</guid>
      <dc:creator>yijunzhou</dc:creator>
      <dc:date>2011-06-17T18:01:36Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730852#M553571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes they are, these, the ones you took &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:27:26&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp;&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to 192.168.6.255/137 on&amp;nbsp; interface outside&lt;/P&gt;&lt;P&gt;2&amp;nbsp; Jun 17 2011&amp;nbsp; 09:27:13&amp;nbsp; 106006&amp;nbsp; 192.168.6.1&amp;nbsp;&amp;nbsp; 137&amp;nbsp; 192.168.6.255&amp;nbsp; 137&amp;nbsp; Deny inbound UDP from 192.168.6.1/137 to&amp;nbsp; 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I cannot see any TCP traffic, would you please connect again, and try to access a server on the inside via, I dont know RDP or something you have allow? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jun 2011 18:09:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730852#M553571</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-17T18:09:14Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730853#M553575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi&amp;nbsp; Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication and authorization are both successful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp;&amp;nbsp; Jun 17 2011&amp;nbsp;&amp;nbsp; 14:53:01&amp;nbsp;&amp;nbsp; 113004&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AAA user authorization Successful : server =&amp;nbsp; LOCAL : user = vpnuser1&lt;/P&gt;&lt;P&gt;6&amp;nbsp;&amp;nbsp; Jun 17 2011&amp;nbsp;&amp;nbsp; 14:53:01&amp;nbsp;&amp;nbsp; 113004&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AAA user authentication Successful : server =&amp;nbsp; 192.168.5.5 : user = vpnuser1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then lots of denial:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp;&amp;nbsp; Jun 17 2011&amp;nbsp;&amp;nbsp; 14:54:11&amp;nbsp;&amp;nbsp; 302014&amp;nbsp;&amp;nbsp; 66.167.16.82&amp;nbsp;&amp;nbsp; 49993&amp;nbsp;&amp;nbsp; 209.10.194.194&amp;nbsp;&amp;nbsp; 443&amp;nbsp;&amp;nbsp; Teardown TCP connection 12470 for outside:66.167.16.82/49993 to identity:209.10.194.194/443 duration 0:00:50 bytes 1911061 TCP Reset-O&lt;/P&gt;&lt;P&gt;2&amp;nbsp;&amp;nbsp; Jun 17 2011&amp;nbsp;&amp;nbsp; 14:54:10&amp;nbsp;&amp;nbsp; 106006&amp;nbsp;&amp;nbsp; 192.168.6.2&amp;nbsp;&amp;nbsp; 137&amp;nbsp;&amp;nbsp; 192.168.6.255&amp;nbsp;&amp;nbsp; 137&amp;nbsp;&amp;nbsp; Deny inbound UDP from 192.168.6.2/137 to 192.168.6.255/137 on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that's because of routing or NAT issue ( I NATed vpn IP address pool to one public IP to access other remote host - companynmr which opened for restricted public IP only)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 4 vpnpool 255.255.255.0 outside &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 4 209.10.194.238 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 209.10.194.193 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;route inside companynet51 255.255.255.0 192.168.5.2 1&lt;/P&gt;&lt;P&gt;route inside companynet52 255.255.255.0 192.168.5.2 1&lt;/P&gt;&lt;P&gt;route inside companynet53 255.255.255.0 192.168.5.2 1&lt;/P&gt;&lt;P&gt;route inside companynet81 255.255.255.0 192.168.5.2 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host dev28 object-group tcp_for_28 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host QuickBooks object-group tcp3389 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 object-group mailslist object-group tcp3389 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host XP object-group tcp3389 log &lt;/P&gt;&lt;P&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host N92 eq ssh log &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list vpnuser1_ONLY extended permit tcp vpnpool 255.255.255.0 host companynmr eq ssh log &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yijun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jun 2011 21:10:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730853#M553575</guid>
      <dc:creator>yijunzhou</dc:creator>
      <dc:date>2011-06-17T21:10:54Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730854#M553579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need you to do a couple of things, first make sure that the host 192.168.5.3 is turned on and that it has RDP enable, then connect a VPN client and finally try to connect via RDP to the host 192.168.5.3. I need you to collect the logs from that connection, you can do it like you have been doing so far or by doing the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Login to ASDM &lt;/P&gt;&lt;P&gt;Go to monitoring----&amp;gt;Logging----&amp;gt;View &lt;/P&gt;&lt;P&gt;On the filter, put the IP address of the RDP host (192.168.5.3)&lt;/P&gt;&lt;P&gt;Then start the connection and see the logs &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other would be this one &lt;/P&gt;&lt;P&gt;Logging Buffered 7 &lt;/P&gt;&lt;P&gt;Logging on &lt;/P&gt;&lt;P&gt;Then try to connect via RDP &lt;/P&gt;&lt;P&gt;Then issue the command show log | inc192.168.5.3 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jun 2011 18:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730854#M553579</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-18T18:44:45Z</dc:date>
    </item>
    <item>
      <title>why no incoming traffic at all</title>
      <link>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730855#M553582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi, mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my vpn configuration works. However, there is another problem: i was not able to let internal host goes to interne and coming back to access another host on different internal vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service mailservice tcp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 6 192.168.4.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 6 xx.xx.xx.201 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) xx.xx.xx.206 192.168.3.136 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE extended permit ip 192.168.4.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE extended permit tcp any host xx.xx.xx.206 object-group mailservice log &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The machine 192.168.4.15 was able access anywhere internet but not &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://xx.xx.xx.206"&gt;https://xx.xx.xx.206&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you help me identify the problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2011 21:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-no-incoming-traffic-at-all/m-p/1730855#M553582</guid>
      <dc:creator>yijunzhou</dc:creator>
      <dc:date>2011-06-23T21:32:46Z</dc:date>
    </item>
  </channel>
</rss>

